Showing 281 - 300 results of 12,451 for search '"sensor networks"', query time: 0.22s Refine Results
  1. 281
  2. 282
  3. 283

    Dynamic privacy management in pervasive sensor networks by Gong, Nan-wei, Laibowitz, Mathew Joel, Paradiso, Joseph A

    Published 2011
    “…This paper describes the design and implementation of a dynamic privacy management system aimed at enabling tangible privacy control and feedback in a pervasive sensor network. Our work began with the development of a potentially invasive sensor network (with high resolution video, audio, and motion tracking capabilities) featuring different interactive applications that created incentive for accepting this network as an extension of people’s daily social space. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 284

    Deploying Sensor Networks With Guaranteed Fault Tolerance by Hajiaghayi, Mohammad Taghi, Bredin, Jonathan L., Demaine, Erik D., Rus, Daniela L.

    Published 2012
    “…We consider the problem of deploying or repairing a sensor network to guarantee a specified level of multipath connectivity (k-connectivity) between all nodes. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 285
  6. 286

    Database abstractions for managing sensor network data by Madden, Samuel R.

    Published 2012
    “…Sensor networking hardware, networking, and operating system software has matured to the point that the major challenges facing the field now have to do with storing, cleaning, and querying the data such networks produce. …”
    Get full text
    Get full text
    Article
  7. 287
  8. 288

    On the key revocation schemes in wireless sensor networks by Mall, Dieynaba, Konaté, Karim, Pathan, Al-Sakib Khan

    Published 2013
    “…Among all security issues, key management is the most attractive mechanism to ensure security of applications and network services in wireless sensor networks. Key management includes two important aspects namely: Key distribution, which constitutes the task of distributing secret keys to nodes in the network and Key revocation, which refers to the task of securely withdrawing the key information relating to any compromised network node. …”
    Get full text
    Proceeding Paper
  9. 289

    Security attacks and challenges in wireless sensor networks by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2009
    “…With the advancements of networking technologies and miniaturization of electronic devices, wireless sensor networks (WSN) have become an emerging area of research in academic, industrial, and defense sectors. …”
    Get full text
    Book Chapter
  10. 290

    Security management in heterogeneous distributed sensor networks by Pathan, Al-Sakib Khan

    Published 2011
    “…A Heterogeneous Distributed Sensor Network (HDSN) is a type of distributed sensor network where sensors with different functional types participate at the same time. …”
    Get full text
    Book Chapter
  11. 291
  12. 292

    Security in wireless sensor networks: issues and challenges by Pathan, Al-Sakib Khan, Lee, Hyung-Woo, Hong, Choong Seon

    Published 2006
    “…Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. …”
    Get full text
    Book Chapter
  13. 293

    Securing sensor reports in wireless sensor networks by Pathan, Al-Sakib Khan, Hong, Choong Seon

    Published 2007
    “…The sensor reports from a wireless sensor network are often used extensively in the decision making process in many systems and applications. …”
    Get full text
    Book Chapter
  14. 294
  15. 295
  16. 296
  17. 297
  18. 298

    Implications of radio fingerprinting on the security of sensor networks by Rasmussen, K, Capkun, S

    Published 2007
    “…We further analyze the implications of device fingerprinting on the security of sensor networking protocols, specifically, we propose two new mechanisms for the detection of wormholes in sensor networks.…”
    Conference item
  19. 299

    The application of self-validation to wireless sensor networks by Collett, M, Cox, M, Duta, M, Esward, T, Harris, P, Henry, M

    Published 2008
    “…Self-validation is a valuable tool for extending the operating range of sensing systems and making them more robust. Wireless sensor networks suffer many limitations meaning that their efficacy could be greatly improved by self-validation techniques. …”
    Journal article
  20. 300